DAY 1:

  • Identifying Entry Points on AWS
  • Security Considerations: Web Applications
  • Application Security
  • Securing Network Communications – Part 1

DAY 2:

  • Data Security
  • Security Considerations: Hybrid Environments
  • Monitoring and Collecting Logs on AWS
  • Processing Logs on AWS
  • Securing Network Communications – Part 2
  • Out-Of-Region Protection

DAY 3:

  • Account Management on AWS
  • Security Considerations: Serverless Environments
  • Secrets Management on AWS
  • Automating Security on AWS
  • Threat Detection and Sensitive Data Monitoring